MESSAGE SECURITY APPLICATION (.TXT) USING THE TRIPLE DES METHOD AND THE COMBINATION OF LSB AND BLUM-BLUM-SHUB METHODS
Main Article Content
Abstract
Security is one of the important aspects of the process of exchanging information (messages). To prevent misuse or attacks by unauthorized parties (attackers) on private messages, the message must be secured. Several methods can be used to secure messages, one of which is by combining the Triple Data Encryption Standard (DES) cryptography method, Blum-Blum Shub (BBS) random number generator, and Least Significant Bit (LSB) steganography. In this study, the Triple DES cryptographic method is used to encrypt messages (embedded-message) with the extension .txt and the BBS random number generator method is used to determine the position of a random pixel to be inserted in the cover-image message. The LSB steganography method is used to perform the embedding process of the encrypted embedded-message at the pixel position resulting from the BBS random number generation process. The test results show that the system can extract embedded messages hidden in a stego-image with 100% accuracy. The maximum number of embedded-message characters that can be used in the test is 150 characters. The test also produces a stego-image that has an average Peak Signal to Noise Ratio (PSNR) value of 88.61, which means that the resulting stego-image has high quality (no significant quality degradation) and the presence of messages in the stego-image is getting harder to detect (imperceptibility).
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
The author who submits the manuscript must understand and agree that if accepted for publication, the copyright of the article belongs to JICON and Nusa Cendana University as the journal publisher. Copyright (copyright) includes the exclusive right to reproduce and provide articles in all forms and media, including reprints, photographs, microfilm and any other similar reproductions, as well as translations. The author has the right for the following:
1. reproduce all or part of published material for the author's own use as classroom teaching materials or oral presentation materials in various forums;
2. reuse part or all of the material as compilation material for the author's written work;
2. make copies of published material for distribution within the institution where the author works.
JICON and Nusa Cendana University and Editors make every effort to ensure that no data, opinion or statement is wrong or misleading to be published in this journal. The content of articles published on JICON is the sole and exclusive responsibility of their respective authors.
References
[2] M. Asad, J. Gilani, and A. Khalid, “An enhanced least significant bit modification technique for audio steganography,” in International Conference on Computer Networks and Information Technology, 2011, pp. 143–147.
[3] E. R. Djuwitaningrum and M. Apriyani, “Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator,” JUITA J. Inform., vol. 4, no. 2, pp. 79–85, 2017.
[4] R. Munir, Kriptografi, Edisi Kedua. Bandung: Informatika, 2019.
[5] R. Arifin and L. T. Oktoviana, “Implementasi Kriptografi dan Steganografi menggunakan Algoritma RSA dan metode LSB,” Univ. Malang, 2013.
[6] B. Isnanto and A. A. Alkodri, “Kriptografi DES Dan Steganografi Pada Dokumen Dan Citra Digital Menggunakan Metode LSB,” J. TI Atma Luhur, vol. 1, no. 1, pp. 38–45, 2014.
[7] G. W. Bhaudhayana and I. M. Widiartha, “Implementasi algoritma kriptografi aes 256 dan metode steganografi lsb pada gambar bitmap,” J Ilmu Komput, vol. 8, no. 2, pp. 15–25, 2015.
[8] I. M. Arrijal, R. Efendi, and B. Susilo, “Penerapan Algoritma Kriptografi Kunci Simetris Dengan Modifikasi Vigenere Cipher Dalam Aplikasi Kriptografi Teks,” Pseudocode, vol. 3, no. 1, pp. 69–82, 2016.
[9] A. Rohmanu, “Implementasi kriptografi dan steganografi dengan metode algoritma DES dan metode End Of File,” J. Inform. SIMANTIK, vol. 2, no. 1, pp. 1–11, 2017.
[10] D. Darwis, W. Wamiliana, and A. Junaidi, “Proses Pengamanan Data Menggunakan Kombinasi Metode Kriptografi Data Encryption Standard dan Steganografi End Of File,” in Prosiding Seminar Nasional METODE KUANTITATIF 2017, 2017, vol. 1, no. 1, pp. 228–240.
[11] I. Utomo, W. S. Sari, and C. A. Sari, “Kombinasi Steganografi-Kriptografi Citra Menggunakan LSB Dan DES,” SNATIF, vol. 5, no. 1, 2018.
[12] P. H. Rantelinggi and E. Saputra, “Algoritma Kriptografi Triple Des dan Steganografi LSB sebagai Metode Gabungan dalam Keamanan Data,” J. Teknol. Inf. Dan Ilmu Komput., vol. 7, no. 4, pp. 661–666, 2019.
[13] I. Febriana, “PENERAPAN TEKNIK KRIPTOGRAFI PADA KEAMANAN SMS ANDROID,” JoEICT J. Educ. ICT, vol. 1, no. 1, Art. no. 1, Mar. 2017, doi: 10.29100/.v1i1.103.
[14] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, no. 3, pp. 727–752, 2010.